US7660982B1 - Subscription broadcast security system - Google Patents
Subscription broadcast security system Download PDFInfo
- Publication number
- US7660982B1 US7660982B1 US10/704,181 US70418103A US7660982B1 US 7660982 B1 US7660982 B1 US 7660982B1 US 70418103 A US70418103 A US 70418103A US 7660982 B1 US7660982 B1 US 7660982B1
- Authority
- US
- United States
- Prior art keywords
- chip
- decryption
- identification
- program
- datastream
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000005236 sound signal Effects 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims abstract description 4
- 238000001514 detection method Methods 0.000 claims description 10
- 238000000034 method Methods 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 3
- 238000013475 authorization Methods 0.000 claims 2
- 230000009469 supplementation Effects 0.000 abstract description 2
- 238000007726 management method Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000007812 deficiency Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000006837 decompression Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47214—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for content reservation or setting reminders; for requesting event notification, e.g. of sport results or stock market
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copyright
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- This invention relates generally to encryption technology and especially to encryption of video and/or audio broadcast signals.
- the subscription broadcast system of this invention concerns an encryption protocol with steganographic supplementation.
- Service distribution organizations such as cable and satellite providers, broadcast television and/or radio programs intended for reception by only those subscribers who have paid for the respective service.
- Conditional access to pay-TV broadcast signals is generally maintained by encryption and/or scrambling techniques.
- Subscribers who purchase these services usually receive a set-top terminal or “box” from the service provider.
- the set-top terminal is essentially a microprocessor that contains an integrated circuit chip programmed for decoding the incoming encrypted audio/video signals.
- a problem with this security arrangement is that the set-top terminal is subject to theft and can then distributed to unauthorized users.
- Another shortcoming is that the encrypted signals entering the set-top terminal can be analyzed for determining the encryption algorithm.
- the decoding “chip” can then be duplicated so as to bypass the service provider set-top terminal for illegally accessing the broadcast signals.
- Another technique for restricting access to encrypted signals is through an addressable set-top terminal and by assigning a unique personal identification code to the subscriber.
- the identification code provides authentication of the subscriber, and is transmitted from the set-top terminal to the service provider. If the identification code confirms that the subscriber is entitled to receive the program, the set-top terminal receives an approval signal from the service provider for programming the terminal to decrypt the signal.
- a deficiency of this security mechanism is that by bombarding the decoder “chip”, in a brute force attack with many different signals, it is possible to discover the approval signal.
- the identification code is continually being changed e.g. by a clock signal, however this system can be defeated by disabling the timing signal generator.
- Some cable and satellite providers use electronic “smart cards” to control subscriber access.
- the “smart cards” typically plug into a card reader slot located in the set-top terminal.
- the “smart cards” contain an integrated circuit chip that holds the “key” that unlocks the encryption algorithm.
- U.S. Pat. Nos. 5,878,134, and 5,426,701 describe some of these devices.
- a limitation of decryption cards is that they are readily “broken” by pirates and duplicated or often stolen for unauthorized decryption.
- Encryption/decryption techniques have been developed that utilize a combination of encrypted signals, such as shown in U.S. Pat. Nos. 5,243,650 and 4,636,851.
- a deficiency of many of these systems is that the decryption code is continually being transmitted thus subjecting the code to be more readily detected, intercepted and deciphered.
- the subscription broadcast security system of this invention is directed to a method and apparatus for preventing the previously discussed theft of audio and video broadcast signals.
- the apparatus of this invention concerns an encryption system having an encoder, an encryptor, a transmitter, a receiver, a decoder, and a management control unit.
- the method of this invention encompasses the encoding of inaudible decoding instructions within the audio signal, encrypting the audio and video signals, transmitting the encrypted audio and video signals to a subscriber receiver, decrypting the audio and video signals using a decoder having a personal ID chip with a unique subscriber identification code that is programmed to constantly change, for example, in response to a timing or clock signal, and a decryption chip that is programmed with numerous decryption codes that can be selectively accessed.
- the ID chip and the decryption chip each receive decoding instructions through a combination of hidden data in the encrypted audio signal and from the management control unit which communicates digitally directly with the ID chip; the ID chip, in turn, inputs data to the decryption chip for implementing the decryption code selection and/or activation.
- the ID chip and the decryption chip are functionally co-dependent and can be incorporated in a single chip.
- the ID chip since the ID chip requires input from the encoded audio signal in combination with the digital transmitted data, a “brute force” attack to “unlock” the ID chip will be ineffective because it can only provide the digital decoding component; the component transmitted through the audio signal is hidden and cannot be detected.
- the ID chip timing or clock signal is cut-off or “frozen”, so as to prevent changing identification codes, the ID chip will deactivate since it is programmed not to operate without receiving a clock signal.
- decryption code selection is obtainable from dual decoding signal sources and therefore it is almost impossible to intercept and replicate.
- Another aspect of this invention is the service provider management control unit which contains a database for matching decoding instructions with the corresponding identification code and the decryption code and for directly communicating with the ID chip in response to authorized requests for service.
- FIG. 1 is a schematic block diagram illustrating a subscription broadcast security system in accordance with this invention
- FIG. 2 is a schematic block diagram illustrating encryption at a broadcast source including encoding, encrypting, and transmitting a program datastream;
- FIG. 3 is a schematic block diagram showing decrypting of the program datastream at a subscriber decoder.
- the reference numeral 10 denotes generally a subscription broadcast security system in accordance with this invention.
- the security system 10 is particularly adapted for pay-TV programming delivered by terrestrial, satellite, or cable transmission.
- a service provider 12 typically originates an encrypted program datastream 14 from an uplink facility for broadcast from a transmitter 15 .
- the program datastream 14 is uplinked to a satellite 16 and then downlinked to a subscriber receiving dish antenna 18 for reception at a digital receiver 20 .
- the program datastream 14 must be decrypted to provide a perceptible video signal at a monitor 22 and an audio signal at a speaker 24 .
- a management aspect of this security system which will be described in further detail hereinafter, includes a communication link 26 between the service provider 12 and subscriber for processing subscription orders and for controlling decryption access.
- the link 26 may, for example, be by telephone line, pager, or cable, and can include two-way communication.
- a television program source 28 such as a “disc farm” of stored video programs generates a digital video signal 30 and an analog audio signal 32 for transmission and reception using conventional standards.
- decoding instructions are concealed in the audio signal 32 using steganographic techniques, such as by replacing bits of data with bits of different invisible information, placing signal data in an undetectable frequency range or alternative methods.
- the resultant embedded decoding instructions are transparently inaudible and do not affect sound quality.
- the hidden decoding instructions are recoverable from the audio signal 32 and survivable after data compression, decompression and other signal processing.
- a management control unit 36 coordinates the decoding instructions with the encryption program in current usage and communicates this information through a code selector 38 .
- the code selector 38 directs an encoder 34 to embed the appropriate instructions within the audio signal 32 .
- the resultant encoded audio signal 32 is digitized and combined with the video signal 30 for processing by a formatter 40 , using known compression and decompression methods for audio/video processing and storage applications, such as the Moving Pictures Expert Group (MPEG) standard.
- MPEG Moving Pictures Expert Group
- the respective audio and video signals 30 , 32 are then encrypted by an encryptor 42 .
- the encryptor 42 receives instructions from the management control unit 36 , through the code selector 38 , for determining the cryptosystem algorithm to use for encryption.
- the encrypted datastream 14 is then broadcast using conventional transmission equipment for reception at the subscriber digital receiver 20 .
- a decoder 46 such as a field-programmable gate array, provides a logic network for decoding the encrypted datastream 14 .
- the decoder 46 may be integrated into the receiver 20 .
- the operating system for the decoder 46 is initialized by a flash boot 48 .
- the decoder 46 includes a personal identification chip 50 , also referred to as ID chip 50 , programmed with an identification code that is unique for each subscriber and further adapted to reconfigure or reset some binary digits (bits) so as to change the unique identification code either at a fixed or at a programmed-timed sequence to provide a constantly changing or “morphing” identification code.
- the ID chip 50 preferably relies upon a sensor to detect a clock signal for the timed code changes.
- the decoder 46 also contains a decryption circuit chip 52 programmed with numerous changeable decryption codes that require the input of binary digits (bits) from the ID chip 50 to be functionally operative.
- the management control unit 36 permits the encrypted program datasteam 14 to be initially processed by the decryption chip 52 .
- the datastream 14 is then directed to a format decoder 54 providing a decoded audio output signal 56 and a decoded video signal 58 .
- the audio signal 56 containing the embedded decoding instructions, is redirected to a detection chip 60 that is programmed to recognize the embedded decoding instructions in the audio signal 56 and in response thereto to transmit “missing” binary digits (bits) to the ID chip 50 to complete the identification code.
- the data transmitted by the detection chip 60 can be used to reconfigure or reset the identification code.
- the detection chip 60 will also transmit “missing” binary digits (bits) to complete the decryption code in the decryption chip 52 .
- the data transmitted can also be used to reset the decryption code or select a particular decryption code within the decryption chip 52 .
- the ID chip 50 and the decryption chip 52 may also be program-controlled by a sensor that detects a clock signal for reconfiguring the respective chips 50 , 52 as a function of system time 62 .
- the embedded instructions received through the audio signal 56 may also be processed by the detection chip 60 for reconfiguring, changing, or erasing the program in the flash boot 48 .
- the management control unit 36 will receive a request for service signal 64 from the ID chip 50 , via the link 26 , with the subscriber's identification code; a determination is made, for example, by comparison with an internal computerized database maintained by the management control unit 36 , whether the subscriber is authorized to receive the program datastream 14 . Upon confirmation, the management control unit 36 will then send an “OK” or approval signal 66 to the ID chip 50 . As a precautionary measure, if the return approval signal 66 is not received by the ID chip 50 within a fixed time frame from initial transmission of the signal 64 , the ID chip 50 is programmed to deactivate.
- the approval signal 66 digitally transmits information to the ID chip 50 , necessary for the decoding, and as previously mentioned, the ID chip 50 will communicate to the decryption chip 52 the “missing” binary digits (bits) required to complete the respective decryption code or code selection.
- the management control unit 36 is coordinated to send the appropriate embedded audio and approval signals corresponding to the respective decryption code and identification code programmed in the decoder 46 .
- the ID chip 50 receives a first approval signal 66
- the ID chip 50 is programmed to send back an acceptance code and thereafter a second and different approval signal is transmitted to the chip ID 50 . This is intended as a further deterrent to any illegal attempts to bypass the ID chip 50 .
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
A subscription broadcast security system for preventing theft of an encrypted program datastream utilizes an encryption protocol with steganographic supplementation. A decoder includes a decryption chip containing numerous decryption codes and an ID chip having a continually changing unique identification code for authenticating subscriber access. The ID chip and the decryption chip each receive decoding instructions through a combination of hidden data in the audio signal and from service provider communication directly with the ID chip.
Description
This application claims the benefit to priority under 35 U.S.C. §119 (e) based on U.S. Provisional Application Ser. No. 60/450,525, filed Feb. 27, 2003 and U.S. Provisional Application Ser. No. 60/454,578, filed Mar. 14, 2003 both filed under 35 U.S.C. §111(b).
1. Field of the Invention
This invention relates generally to encryption technology and especially to encryption of video and/or audio broadcast signals.
In particular, the subscription broadcast system of this invention concerns an encryption protocol with steganographic supplementation.
2. Background Information
Service distribution organizations, such as cable and satellite providers, broadcast television and/or radio programs intended for reception by only those subscribers who have paid for the respective service. Conditional access to pay-TV broadcast signals is generally maintained by encryption and/or scrambling techniques. Subscribers who purchase these services usually receive a set-top terminal or “box” from the service provider. The set-top terminal is essentially a microprocessor that contains an integrated circuit chip programmed for decoding the incoming encrypted audio/video signals.
A problem with this security arrangement is that the set-top terminal is subject to theft and can then distributed to unauthorized users. Another shortcoming is that the encrypted signals entering the set-top terminal can be analyzed for determining the encryption algorithm. The decoding “chip” can then be duplicated so as to bypass the service provider set-top terminal for illegally accessing the broadcast signals.
Another technique for restricting access to encrypted signals is through an addressable set-top terminal and by assigning a unique personal identification code to the subscriber. The identification code provides authentication of the subscriber, and is transmitted from the set-top terminal to the service provider. If the identification code confirms that the subscriber is entitled to receive the program, the set-top terminal receives an approval signal from the service provider for programming the terminal to decrypt the signal. A deficiency of this security mechanism is that by bombarding the decoder “chip”, in a brute force attack with many different signals, it is possible to discover the approval signal. In a modified format, the identification code is continually being changed e.g. by a clock signal, however this system can be defeated by disabling the timing signal generator.
Some cable and satellite providers use electronic “smart cards” to control subscriber access. The “smart cards” typically plug into a card reader slot located in the set-top terminal. The “smart cards” contain an integrated circuit chip that holds the “key” that unlocks the encryption algorithm. U.S. Pat. Nos. 5,878,134, and 5,426,701 describe some of these devices. A limitation of decryption cards is that they are readily “broken” by pirates and duplicated or often stolen for unauthorized decryption.
Encryption/decryption techniques have been developed that utilize a combination of encrypted signals, such as shown in U.S. Pat. Nos. 5,243,650 and 4,636,851. A deficiency of many of these systems is that the decryption code is continually being transmitted thus subjecting the code to be more readily detected, intercepted and deciphered.
Briefly, the subscription broadcast security system of this invention is directed to a method and apparatus for preventing the previously discussed theft of audio and video broadcast signals. The apparatus of this invention concerns an encryption system having an encoder, an encryptor, a transmitter, a receiver, a decoder, and a management control unit. The method of this invention encompasses the encoding of inaudible decoding instructions within the audio signal, encrypting the audio and video signals, transmitting the encrypted audio and video signals to a subscriber receiver, decrypting the audio and video signals using a decoder having a personal ID chip with a unique subscriber identification code that is programmed to constantly change, for example, in response to a timing or clock signal, and a decryption chip that is programmed with numerous decryption codes that can be selectively accessed.
The ID chip and the decryption chip each receive decoding instructions through a combination of hidden data in the encrypted audio signal and from the management control unit which communicates digitally directly with the ID chip; the ID chip, in turn, inputs data to the decryption chip for implementing the decryption code selection and/or activation. The ID chip and the decryption chip are functionally co-dependent and can be incorporated in a single chip.
Furthermore, since the ID chip requires input from the encoded audio signal in combination with the digital transmitted data, a “brute force” attack to “unlock” the ID chip will be ineffective because it can only provide the digital decoding component; the component transmitted through the audio signal is hidden and cannot be detected.
It should also be apparent that if the ID chip is bypassed the decryption chip will lack data input from the ID chip and thus will be ineffective.
If the ID chip timing or clock signal is cut-off or “frozen”, so as to prevent changing identification codes, the ID chip will deactivate since it is programmed not to operate without receiving a clock signal.
Additionally, any attempt to duplicate the decryption chip will also be unsuccessful for the reason the decryption codes are continually changing. It should also be noted that decryption code selection is obtainable from dual decoding signal sources and therefore it is almost impossible to intercept and replicate.
Another aspect of this invention is the service provider management control unit which contains a database for matching decoding instructions with the corresponding identification code and the decryption code and for directly communicating with the ID chip in response to authorized requests for service.
Having thus summarized the invention, it will be seen that it is an object thereof to provide a subscription broadcast security system of the general character described herein which is not subject to the aforementioned limitations, shortcomings, and deficiencies.
With these ends in view, the invention finds embodiment in certain combinations of elements and arrangement of components for which the aforementioned objects and certain other objects are hereinafter attained, all as more fully described with reference to the accompanying drawings and the scope of which is more particularly pointed out and indicated in the appended claims.
In the accompanying drawings in which is shown an exemplary embodiment of the invention:
Referring now in detail to the drawings, and in particular to FIG. 1 , the reference numeral 10, denotes generally a subscription broadcast security system in accordance with this invention. The security system 10 is particularly adapted for pay-TV programming delivered by terrestrial, satellite, or cable transmission.
By way of overview, a service provider 12 typically originates an encrypted program datastream 14 from an uplink facility for broadcast from a transmitter 15. For the purpose of this discussion, the program datastream 14 is uplinked to a satellite 16 and then downlinked to a subscriber receiving dish antenna 18 for reception at a digital receiver 20. The program datastream 14 must be decrypted to provide a perceptible video signal at a monitor 22 and an audio signal at a speaker 24. A management aspect of this security system which will be described in further detail hereinafter, includes a communication link 26 between the service provider 12 and subscriber for processing subscription orders and for controlling decryption access. The link 26 may, for example, be by telephone line, pager, or cable, and can include two-way communication.
The encryption of the program datastream 14 will be described in further detail with reference to FIG. 2 . In this schematic diagram, a television program source 28, such as a “disc farm” of stored video programs generates a digital video signal 30 and an analog audio signal 32 for transmission and reception using conventional standards.
In accordance with the security system of this invention, decoding instructions are concealed in the audio signal 32 using steganographic techniques, such as by replacing bits of data with bits of different invisible information, placing signal data in an undetectable frequency range or alternative methods. The resultant embedded decoding instructions are transparently inaudible and do not affect sound quality. Furthermore, the hidden decoding instructions are recoverable from the audio signal 32 and survivable after data compression, decompression and other signal processing. A management control unit 36 coordinates the decoding instructions with the encryption program in current usage and communicates this information through a code selector 38. The code selector 38 directs an encoder 34 to embed the appropriate instructions within the audio signal 32.
The resultant encoded audio signal 32 is digitized and combined with the video signal 30 for processing by a formatter 40, using known compression and decompression methods for audio/video processing and storage applications, such as the Moving Pictures Expert Group (MPEG) standard. The respective audio and video signals 30, 32 are then encrypted by an encryptor 42. The encryptor 42 receives instructions from the management control unit 36, through the code selector 38, for determining the cryptosystem algorithm to use for encryption. The encrypted datastream 14 is then broadcast using conventional transmission equipment for reception at the subscriber digital receiver 20.
The decryption will now be discussed with reference to FIG. 3 . A decoder 46, such as a field-programmable gate array, provides a logic network for decoding the encrypted datastream 14. The decoder 46 may be integrated into the receiver 20. The operating system for the decoder 46 is initialized by a flash boot 48. The decoder 46 includes a personal identification chip 50, also referred to as ID chip 50, programmed with an identification code that is unique for each subscriber and further adapted to reconfigure or reset some binary digits (bits) so as to change the unique identification code either at a fixed or at a programmed-timed sequence to provide a constantly changing or “morphing” identification code. The ID chip 50 preferably relies upon a sensor to detect a clock signal for the timed code changes.
The decoder 46 also contains a decryption circuit chip 52 programmed with numerous changeable decryption codes that require the input of binary digits (bits) from the ID chip 50 to be functionally operative.
The management control unit 36 permits the encrypted program datasteam 14 to be initially processed by the decryption chip 52. The datastream 14 is then directed to a format decoder 54 providing a decoded audio output signal 56 and a decoded video signal 58. The audio signal 56, containing the embedded decoding instructions, is redirected to a detection chip 60 that is programmed to recognize the embedded decoding instructions in the audio signal 56 and in response thereto to transmit “missing” binary digits (bits) to the ID chip 50 to complete the identification code. Alternatively, the data transmitted by the detection chip 60 can be used to reconfigure or reset the identification code. The detection chip 60 will also transmit “missing” binary digits (bits) to complete the decryption code in the decryption chip 52. The data transmitted can also be used to reset the decryption code or select a particular decryption code within the decryption chip 52. Independently or in combination with the above, the ID chip 50 and the decryption chip 52 may also be program-controlled by a sensor that detects a clock signal for reconfiguring the respective chips 50, 52 as a function of system time 62. Furthermore, the embedded instructions received through the audio signal 56 may also be processed by the detection chip 60 for reconfiguring, changing, or erasing the program in the flash boot 48.
In operation, the management control unit 36, will receive a request for service signal 64 from the ID chip 50, via the link 26, with the subscriber's identification code; a determination is made, for example, by comparison with an internal computerized database maintained by the management control unit 36, whether the subscriber is authorized to receive the program datastream 14. Upon confirmation, the management control unit 36 will then send an “OK” or approval signal 66 to the ID chip 50. As a precautionary measure, if the return approval signal 66 is not received by the ID chip 50 within a fixed time frame from initial transmission of the signal 64, the ID chip 50 is programmed to deactivate.
The approval signal 66 digitally transmits information to the ID chip 50, necessary for the decoding, and as previously mentioned, the ID chip 50 will communicate to the decryption chip 52 the “missing” binary digits (bits) required to complete the respective decryption code or code selection.
It should also be apparent that the management control unit 36 is coordinated to send the appropriate embedded audio and approval signals corresponding to the respective decryption code and identification code programmed in the decoder 46. As an additional anti-theft measure, in an alternate embodiment, after the ID chip 50 receives a first approval signal 66, the ID chip 50 is programmed to send back an acceptance code and thereafter a second and different approval signal is transmitted to the chip ID 50. This is intended as a further deterrent to any illegal attempts to bypass the ID chip 50.
It should thus be seen that there is provided a subscription broadcast security system which achieves the various objects of this invention and which is well adapted to meet conditions of practical use.
Since various possible embodiments of the present invention or modifications might be made to the exemplary embodiment set forth above, it is to be understood that the above drawings and descriptions are to be interpreted as illustrative and not in a limiting sense.
Claims (8)
1. A method for preventing piracy of a subscription broadcast intended for reception by authorized subscribers comprising the steps of:
a) providing a program source including an analog audio signal and a digital video signal;
b) generating a program datagram from the program source;
c) embedding hidden decoding instructions within the analog audio signal;
d) formatting the program datastream;
e) providing an encryption program for encrypting the formatted datastream;
f) coordinating the decoding instructions with the encryption program;
g) transmitting the encrypted datastream to authorized subscribers having unique subscriber identification codes;
h) providing a decoder including a detection chip, a decryption chip and an identification chip for decoding the subscriber received datastream by:
i. utilizing the detection chip for detecting the embedded decoding instructions within the analog audio signal;
ii. utilizing the decoding instructions for reconfiguring a decryption code within the decryption chip;
iii. further utilizing the decoding instructions for reconfiguring an identification code within the identification chip; and
iv. communicating information received by the identification chip from the program source to the decryption chip for completing the decryption code to enable access to the datastream.
2. A subscription broadcast security system for providing conditional access to a service provider program source, said program source including a digital video signal and an analog audio signal, said analog audio signal provided with embedded decoding instructions, a code selector for coordinating said decoding instructions with an encryption program, a formatter for formatting the analog audio and digital video signals, an encryptor for encrypting the analog audio and digital video signals in accordance with the encryption program to provide an encrypted datastream, a decoder for decrypting the encrypted datastream, said decoder including an identification chip, a decryption chip and a detection chip, said identification chip being programmed with a plurality of identification codes, said identification codes being unique to each subscriber for authenticating subscriber authorization to access the encrypted datastream, said identification codes further being selectively reconfigured, said decryption chip including a plurality of decryption codes for decoding the encrypted datastream, said decryption codes further being selectively reconfigured, said identification chip being linked to the service provider for receiving instructions for authenticating subscriber authorization and decryption code selection, said identification chip further being in communication with the decryption chip for reconfiguring the decryption code, said detection chip being programmed to detect the embedded decoding instructions within the analog audio signal and for selectively reconfiguring the decryption code to enable decryption access to the datastream with the reconfiguration being a function of the embedded decoding instructions received in the analog audio signal and transmitted by the detection chip and the decryption code selection instructions received from the service provider and transmitted by the identification chip.
3. A subscription broadcast security system as claimed in claim 2 wherein at least one of the identification chip and the decryption chip is further reconfigured as a function of system time.
4. A subscription broadcast security system as claimed in claim 2 further including a flash boot program for loading the decoder, wherein input data from the detection chip is adapted to selectively reconfigure the flash boot program.
5. A subscription broadcast security system as claimed in claim 2 wherein the decryption chip is further programmed to reconfigure the decryption codes in at least one of a fixed or program-timed sequence.
6. A subscription broadcast security system as claimed in claim 2 wherein the decoder includes a field-programmable gate array.
7. A subscription broadcast security system for providing conditional access to a service provider program source as claimed in claim 2 wherein the embedded decoding instructions within the audio signal are used to selectively reconfigure the identification code.
8. A subscription broadcast system for providing conditional access to a service provider program source as claimed in claim 2 wherein the identification chip further includes a plurality of identification codes with a set of identification codes being unique to each subscriber and programmed to constantly change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/704,181 US7660982B1 (en) | 2003-02-27 | 2003-11-07 | Subscription broadcast security system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US45052503P | 2003-02-27 | 2003-02-27 | |
US45457803P | 2003-03-14 | 2003-03-14 | |
US10/704,181 US7660982B1 (en) | 2003-02-27 | 2003-11-07 | Subscription broadcast security system |
Publications (1)
Publication Number | Publication Date |
---|---|
US7660982B1 true US7660982B1 (en) | 2010-02-09 |
Family
ID=41646547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/704,181 Active 2025-10-13 US7660982B1 (en) | 2003-02-27 | 2003-11-07 | Subscription broadcast security system |
Country Status (1)
Country | Link |
---|---|
US (1) | US7660982B1 (en) |
Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4636851A (en) | 1982-04-23 | 1987-01-13 | Independent Broadcasting Authority | Signal coding for secure transmission |
US4761808A (en) * | 1987-03-18 | 1988-08-02 | Sheldon Howard | Time code telephone security access system |
US4815129A (en) | 1985-01-02 | 1989-03-21 | General Instrument Corp. | Video encryption system |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4887296A (en) * | 1984-10-26 | 1989-12-12 | Ricoh Co., Ltd. | Cryptographic system for direct broadcast satellite system |
US5101432A (en) | 1986-03-17 | 1992-03-31 | Cardinal Encryption Systems Ltd. | Signal encryption |
US5243650A (en) | 1990-03-23 | 1993-09-07 | Televerket | Method and apparatus for encryption/decryption of digital multisound in television |
US5426701A (en) | 1994-02-28 | 1995-06-20 | General Instrument Corporation Of Delaware | Cable television converter box with a smart card connector underneath |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US5659618A (en) | 1995-09-29 | 1997-08-19 | Vlsi Technology, Inc. | Multi-size cryptographic key system |
US5715315A (en) | 1993-08-19 | 1998-02-03 | News Datacom Ltd | CATV systems |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US5878134A (en) | 1994-10-03 | 1999-03-02 | News Data Com Ltd. | Secure access systems utilizing more than one IC card |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US6145081A (en) * | 1998-02-02 | 2000-11-07 | Verance Corporation | Method and apparatus for preventing removal of embedded information in cover signals |
US6266812B1 (en) | 1999-08-11 | 2001-07-24 | Nfocom Technology Co., Ltd. | Addressable CATV end-user payment collection management system |
US6272635B1 (en) | 1994-10-27 | 2001-08-07 | Mitsubishi Corporation | Data copyright management system |
US6289314B1 (en) | 1996-09-18 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals |
US20020044658A1 (en) * | 1995-04-03 | 2002-04-18 | Wasilewski Anthony J. | Conditional access system |
US20020097873A1 (en) * | 1997-05-19 | 2002-07-25 | Rade Petrovic | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
US20020140857A1 (en) * | 2001-03-30 | 2002-10-03 | Limaye Ajit M. | Audio/video processing engine |
US6498851B1 (en) | 1998-11-25 | 2002-12-24 | Sandisk Corporation | Data encryption and signal scrambling using programmable data conversion arrays |
US20030074565A1 (en) | 1995-04-03 | 2003-04-17 | Wasilewski Anthony J. | Authorization of services in a conditional access system |
US6721437B1 (en) * | 1999-02-05 | 2004-04-13 | Sony Corporation | Data processing apparatus, coding apparatus, data processing method and coding method |
US7159118B2 (en) * | 2001-04-06 | 2007-01-02 | Verance Corporation | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes |
-
2003
- 2003-11-07 US US10/704,181 patent/US7660982B1/en active Active
Patent Citations (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4636851A (en) | 1982-04-23 | 1987-01-13 | Independent Broadcasting Authority | Signal coding for secure transmission |
US4887296A (en) * | 1984-10-26 | 1989-12-12 | Ricoh Co., Ltd. | Cryptographic system for direct broadcast satellite system |
US4815129A (en) | 1985-01-02 | 1989-03-21 | General Instrument Corp. | Video encryption system |
US5101432A (en) | 1986-03-17 | 1992-03-31 | Cardinal Encryption Systems Ltd. | Signal encryption |
US4761808A (en) * | 1987-03-18 | 1988-08-02 | Sheldon Howard | Time code telephone security access system |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US5243650A (en) | 1990-03-23 | 1993-09-07 | Televerket | Method and apparatus for encryption/decryption of digital multisound in television |
US5715315A (en) | 1993-08-19 | 1998-02-03 | News Datacom Ltd | CATV systems |
US5426701A (en) | 1994-02-28 | 1995-06-20 | General Instrument Corporation Of Delaware | Cable television converter box with a smart card connector underneath |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US5878134A (en) | 1994-10-03 | 1999-03-02 | News Data Com Ltd. | Secure access systems utilizing more than one IC card |
US6272635B1 (en) | 1994-10-27 | 2001-08-07 | Mitsubishi Corporation | Data copyright management system |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US20020044658A1 (en) * | 1995-04-03 | 2002-04-18 | Wasilewski Anthony J. | Conditional access system |
US20030074565A1 (en) | 1995-04-03 | 2003-04-17 | Wasilewski Anthony J. | Authorization of services in a conditional access system |
US6526508B2 (en) | 1995-04-03 | 2003-02-25 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US5659618A (en) | 1995-09-29 | 1997-08-19 | Vlsi Technology, Inc. | Multi-size cryptographic key system |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6289314B1 (en) | 1996-09-18 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals |
US20020097873A1 (en) * | 1997-05-19 | 2002-07-25 | Rade Petrovic | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
US6145081A (en) * | 1998-02-02 | 2000-11-07 | Verance Corporation | Method and apparatus for preventing removal of embedded information in cover signals |
US6498851B1 (en) | 1998-11-25 | 2002-12-24 | Sandisk Corporation | Data encryption and signal scrambling using programmable data conversion arrays |
US20030034909A1 (en) | 1998-11-25 | 2003-02-20 | Wong Sau C. | Data encryption and signal scrambling using programmable data conversion arrays |
US6721437B1 (en) * | 1999-02-05 | 2004-04-13 | Sony Corporation | Data processing apparatus, coding apparatus, data processing method and coding method |
US6266812B1 (en) | 1999-08-11 | 2001-07-24 | Nfocom Technology Co., Ltd. | Addressable CATV end-user payment collection management system |
US20020140857A1 (en) * | 2001-03-30 | 2002-10-03 | Limaye Ajit M. | Audio/video processing engine |
US7159118B2 (en) * | 2001-04-06 | 2007-01-02 | Verance Corporation | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4216534B2 (en) | Time verification system | |
EP1825678B1 (en) | System and method for secure conditional access download and reconfiguration | |
US8254576B2 (en) | System and method for limiting access to data | |
CN1278558C (en) | Method and system for conditional access | |
EP2802152B1 (en) | Method for secure processing a stream of encrypted digital audio / video data | |
US7835522B2 (en) | Embedded blacklisting for digital broadcast system security | |
CN101617520B (en) | A conditional access system | |
HRP20000165A2 (en) | Method and apparatus for encrypted data stream transmission | |
JP2003518843A (en) | How to operate a conditional access system to the broadcasting sector | |
US20060218646A1 (en) | Method and system for managing digital rights | |
US8401190B2 (en) | Portable security module pairing | |
EP1488641A1 (en) | Conditional access control | |
EP1568226A1 (en) | Messaging over mobile phone network for digital multimedia network | |
EP2425620B1 (en) | Method to secure access to audio/video content in a decoding unit | |
US7660982B1 (en) | Subscription broadcast security system | |
US7802106B2 (en) | Method and system for guaranteeing the integrity of at least one software program which is transmitted to an encryption/decryption module and recording media for implementing same | |
WO2000013151A1 (en) | Security system | |
JP4801515B2 (en) | Scramble key management device, scramble key management information transmission device, scramble key output management method, scramble key management program, license information management device, license management information transmission device, license information output management method, and license information management program | |
CN100508591C (en) | Remote control protocol for a local action to generate a command message | |
MXPA01007879A (en) | Method and apparatus for encrypted transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |